Cybersecurity trends in 2025 | Kaspersky official blog

The outgoing 2024 brought a number of record-breaking data breaches — from the Taylor Swift concert ticket case, to the incident with 100 million Americans’ medical records. AI technology and cybercrime made leaps and bounds all year long. So how can you stay on top of all this to ensure personal information security? Here’s how: make these seven New Year resolutions — and stick to them throughout 2025.

1. Learn to use AI assistants securely

Over the past year, the use of AI has evolved from a trending novelty to a part of life — especially after AI assistants became smartphone features. Given that AI is now literally in the palm of your hand — offering at times quite personal advice — it’s worth getting to grips with the rules for safe chatbot use to keep yourself and others out of harm’s way. Here they are in a nutshell:

  • Double-check AI advice — especially when asking for information about medicines, investments, or other queries where errors are costly. Chatbots are known to “hallucinate”, so never blindly follow their tips.
  • Disable AI features unless you know what they’re for. The “smart” craze is driving companies to integrate AI even where it’s not needed. The most striking example is the rollout of the controversial Recall feature in Windows 11, where it continuously captures screenshots for AI analysis. Disable AI if you’re not actively using it.
  • Never give personal information to AI. Photos of documents, passport details, financial and medical information are almost never needed for AI to function correctly. Given that such data may get stored for a long time and used for AI training — and thus be more likely to leak — it’s better not to upload such data in the first place.
  • Don’t chat with family and friends through AI. Such automation is rarely useful and won’t help maintain closeness.

2. Switch to passkeys instead of passwords

Tech majors are gradually ditching passwords for more reliable passkeys; for example, Microsoft plans to move a billion users over to this new technology. With it, logging in to any site will be by means of biometric verification or PIN code. The check is carried out locally on your computer or smartphone, after which the device decrypts from its storage a unique cryptographic key for the website in question, which “recognizes” you by this key. In some services, “Passkey” is the actual name of the login method; others, like Microsoft, mention “Face, Fingerprint, or PIN”. Whatever name it goes by, the method is more reliable than a combination of a password and one-time code — as well as easier and faster to use. If passkeys are on offer — get them!

3. Find and change all old passwords

Despite the advent of passkeys, passwords will remain with us for many years to come, and that means lots more leaks and hacks. Old passwords that you created years ago with little thought to length or strength can be brute-forced without too much trouble. For example, this year saw the biggest password leak in history. Dubbed RockYou2024, it contained 10 billion (!) unique records. Many of them are encrypted, but modern video cards can be used to crack shorter passwords. In our study of password strength, it turned out that six out of ten user passwords found in this leak could be broken in a few seconds to one hour.

To thwart password crackers, go through all your passwords and reset any that are short (fewer than 12 characters) or very old, and create new ones in accordance with best security practices. As you know, passwords should never be reused, so it’s best to generate new ones and store them in a reliable password manager.

4. Teach family and friends how to spot deepfakes

The rapid advance of neural networks has allowed scammers to move from deepfake videos of celebrities, to inexpensive and relatively massive attacks on specific individuals using fake voices and images of… absolutely anyone. Deepfakes were first used to promote financial pyramids or fake charities, but now targeted scams are in play; for example, calls from the victim’s “boss” or a “loved one”. It’s now easier than ever to make a video of someone you know well asking for money or something else, so always double-check unusual requests by making contact with the person through another channel.

Given the vast leakage of medical records in 2024, we can expect to see new targeted “doctor scams” in the coming year.

5. Switch to private messengers

For those who still believe in privacy, 2024 delivered a couple of major setbacks. First, the arrest of Telegram founder Pavel Durov raised fears that intelligence agencies could start snooping on users’ correspondence. Next, the United States was rocked by scandal when it broke that foreign intelligence agencies had hacked the legal wiretapping system operated by all U.S. telecom providers, and gained access to the calls and texts of Americans. The authorities went so far as to advise people to switch to private messengers for greater privacy.

To sleep more soundly at night, follow this tip and, together with your main contacts, move to a messenger with end-to-end encryption.

6. Set aside a monthly “backup hour” in your calendars

If you don’t even remember when you last backed up your data, it’s time to schedule this activity — which is no less important than annual car maintenance or spring cleaning your house; however, backups should be much more frequent: daily, weekly or monthly — depending on the data type.

Backup must be two-way: back up data on your phone and computer to cloud storage, and download cloud data to local storage. An example of the former is photos on your phone. An example of the latter is Gmail messages.

This way, you’ll be protected against a wide range of problems: computer crashes, smartphone theft, ransomware attacks, house fires, your favorite recipe site being shut down, movies and music disappearing from streaming platforms, sudden hikes in cloud-hosting charges, and so on. For best practices for backing up from the cloud, see our post here; and to the cloud, see here. Another of our guides explains how to save important online data stress-free, so you don’t have to worry about your favorite sites or services disappearing. And under the backup tag on our blog, you’ll find no end of practical tips on saving data from anywhere, including messengers, authenticator apps, and note-taking tools.

7. Enter your card number less often

In 2024, cloud storage provider Snowflake suffered a string of massive leaks of customer data. Among the companies affected were AT&T, Live Nation (Ticketmaster), and Santander. The exact makeup of the information in each leak remains unclear.

So as not to be left guessing if your payment data is safe, and not to mess around with contacting banks and reissuing cards after every major leak, save your card to a reputable, secure service (PayPal, Google Pay, Apple Pay, or similar), and use it to pay for purchases wherever possible. That goes for both offline and online purchases. This will make it harder for attackers to intercept your payment data and reduce the likelihood of damage in the event of a large store or online service hack.

If you need to enter card details but your preferred payment service isn’t an option, use the Safe Money feature in any of our home security solutions.

Kaspersky official blog – ​Read More

FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks

Cybersecurity researchers are warning about a spike in malicious activity that involves roping vulnerable D-Link routers into two different botnets, a Mirai variant dubbed FICORA and a Kaiten (aka Tsunami) variant called CAPSAICIN.
“These botnets are frequently spread through documented D-Link vulnerabilities that allow remote attackers to execute malicious commands via a GetDeviceSettings

The Hacker News – ​Read More

Palo Alto Releases Patch for PAN-OS DoS Flaw — Update Immediately

Palo Alto Networks has disclosed a high-severity vulnerability impacting PAN-OS software that could cause a denial-of-service (DoS) condition on susceptible devices.
The flaw, tracked as CVE-2024-3393 (CVSS score: 8.7), impacts PAN-OS versions 10.X and 11.X, as well as Prisma Access running PAN-OS versions. It has been addressed in PAN-OS 10.1.14-h8, PAN-OS 10.2.10-h12, PAN-OS 11.1.5, PAN-OS

The Hacker News – ​Read More

China Accuses the U.S. of Hacking Back as Cyber Conflict Grows 

Cyble | Cyber espionage

Overview

U.S. national security and cybersecurity agencies have leveled cyber espionage accusations against the People’s Republic of China (PRC) for much of 2024, accusing the PRC of infiltrating U.S. critical infrastructure and telecom networks – possibly in preparation for a potential cyber war between the two global powers. 

China has pushed back, calling such charges misinformation and accusing the U.S. of its own espionage campaigns. While the PRC’s claims merit skepticism – most notably that alleged Volt Typhoon activities have been U.S. misinformation or “false flag” operations – new claims by China that two recent sophisticated cyberattacks were carried out by the U.S. are worth examining if only for the details and security insights they provide. 

We’ll examine those claims – along with an overview of the depth and breadth of PRC activities in 2024, U.S. responses, and recommendations for telecom and critical infrastructure security. 

China Claims Two U.S. Cyber Espionage Attacks 

China’s counter charges to U.S. cyber espionage claims have largely been based on decade-old NSA leaks, so the PRC’s latest claims are notable for their focus on two recent specific incidents while avoiding those larger claims. 

In a December 18 bulletin, China’s National Internet Emergency Center (CNCERT) claims it “discovered and handled two cases in which the United States launched cyber attacks on large Chinese technology companies and institutions to steal commercial secrets” [translated]. 

Beginning in August 2024, an “advanced material design and research unit … has been attacked by a suspected US intelligence agency,” CNCERT claims. The attackers “exploited a vulnerability in a certain electronic document security management system in China to invade the software upgrade management server deployed by the company, and delivered control Trojans to more than 270 hosts of the company through the software upgrade service, stealing a large amount of commercial secrets and intellectual property of the company.” 

The second alleged attack was against “a large-scale high-tech enterprise in … smart energy and digital information.” The attackers in that case “used multiple overseas springboards to exploit Microsoft Exchange vulnerabilities, invaded and controlled the company’s mail server and implanted backdoor programs to continuously steal mail data. At the same time, the attackers used the mail server as a springboard to attack and control more than 30 devices of the company and its subsidiaries, stealing a large amount of the company’s commercial secrets.” 

While it is impossible to determine the veracity of China’s latest claims, given the extent of PRC campaigns against U.S. targets, it would not be surprising if the U.S. were engaged in counter efforts. Whether those efforts would include what may be industrial espionage in these cases is perhaps less likely, unless the targets could provide important strategic information – which may be possible in the case of the smart energy company, for example. Nonetheless, there is no shortage of nation-state or financially motivated threat actors (TAs) capable of carrying out such attacks, so without technical specifics that could link the attacks to a TA, the claims are unsupported. 

A Timeline of PRC Campaigns Targeting the U.S. 

2024 has seen a notable increase in cyber tensions between the two countries. Here are some of the key developments. 

PRC Positioning in U.S. Critical Infrastructure 

In February, the U.S. and the other “Five Eyes” countries warned that “People’s Republic of China (PRC) state-sponsored cyber actors are seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against U.S. critical infrastructure in the event of a major crisis or conflict with the United States.” 

U.S. national security and cybersecurity agencies have repeated those claims a number of times since then – including speculation that China may be preparing for cyber conflict as part of its goal of having the capability to invade Taiwan by 2027. 

U.S. Government Breaches 

A July 2023 breach of U.S. government email accounts received a thorough accounting in 2024 in reports and hearings, including pledges from Microsoft that it would address the security failings that led to the breaches as well as make security a top priority for the company going forward. 

Wiretap System and Telecom Breaches 

The revelation in early October that the PRC-linked Salt Typhoon group had breached the U.S. court wiretap system was followed a few weeks later by news that the telecom network breaches behind that attack also led to attacks targeting the phone communications of U.S. officials at the highest levels

What followed was a stark reassessment of telecom network security – some of which may not be as risk-focused as perhaps would be ideal. 

Focus on Chinese Network Equipment May Overlook Other Risks 

The U.S. is engaged in a $5 billion “rip and replace” effort to remove Chinese equipment from U.S. telecom networks in an effort to address those security issues. 

While government intervention may well be necessary to shore up the significant gaps in telecom and critical infrastructure security, focusing narrowly on only equipment from China ignores gaps from other vulnerabilities that may be just as critical. 

While not revealing details, Senator Mark Warner – a former telecom venture capitalist – recently told the Washington Post that “thousands and thousands and thousands” of vulnerable telecom network devices might need to be replaced. “The big networks are combinations of a whole series of acquisitions, and you have equipment out there that’s so old it’s unpatchable,” Warner said. 

Vulnerable legacy devices, whether in telecom or operational technology (OT) networks, are at the heart of the cybersecurity crisis confronting telecom and critical infrastructure. Replacing just one source of those issues likely won’t provide a comprehensive solution. 

A much broader program that emphasizes replacing legacy devices wherever possible, along with essential security practices like network segmentation and access control, will likely be required to solve persistent security vulnerabilities and threats in telecom and other critical infrastructure. 

The post China Accuses the U.S. of Hacking Back as Cyber Conflict Grows  appeared first on Cyble.

Blog – Cyble – ​Read More

RFP Templates and Guidebook

A request for proposal is a common method for soliciting vendor quotes and answers about potential product or service offerings. They specifically intend to gather details involving implementation, operations, and maintenance. This facilitates the decision-making process, allowing organizations to choose the RFP responses which best suit their needs. This guidebook, written by Scott Matteson for …

Security | TechRepublic – ​Read More

Apache MINA CVE-2024-52046: CVSS 10.0 Flaw Enables RCE via Unsafe Serialization

The Apache Software Foundation (ASF) has released patches to address a maximum severity vulnerability in the MINA Java network application framework that could result in remote code execution under specific conditions.
Tracked as CVE-2024-52046, the vulnerability carries a CVSS score of 10.0. It affects versions 2.0.X, 2.1.X, and 2.2.X.
“The ObjectSerializationDecoder in Apache MINA uses Java’s

The Hacker News – ​Read More

Hackers Release Second Batch of Stolen Cisco Data

IN THIS ARTICLE: Hackers have released what they claim to be the second batch of data stolen in…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Japan Airlines resumes operations after cyberattack delays flights

The company claimed that no customer information was leaked and that it suffered no damage from computer viruses. There was also no impact on flight safety, according to JAL.

The Record from Recorded Future News – ​Read More

UN General Assembly approves cybercrime treaty despite industry backlash

The agreement provides a framework for how law enforcement agencies in different countries coordinate on cybercrime investigations and is being touted as a way to reduce the number of safe havens for cybercriminals as well as help developing nations better protect their citizens from digital crimes.

The Record from Recorded Future News – ​Read More

Two Californians charged in the largest NFT fraud case to date

SUMMARY Two California men have been arrested and charged in what is being called the largest NFT fraud…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More